Criminal Group Uses AI Deepfake Technology to Steal Personal Data in Hangzhou, Zhejiang
September 13, 2024
A criminal group in China used AI face-swapping technology to bypass face recognition systems on major platforms, steal personal data, and sell it to fraud syndicates. The group generated convincing video simulations from static photos to breach accounts, reportedly earning 200,000 yuan. After an investigation by the Hangzhou Public Security Bureau, four suspects were arrested across the provinces of Anhui, Guizhou, and Zhejiang.
- Alleged deployer
- hu-mouyun, hu-mouliang, zhang-mouguo, wu-mouhao
- Alleged developer
- unknown-deepfake-detection-technology-developers
- Alleged harmed parties
- chinese-citizens, zhejiang-citizens, anhui-citizens, guizhou-citizens
Source
Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/806
Data source
Incident data is from the AI Incident Database (AIID).
When citing the database as a whole, please use:
McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.
Pre-print on arXiv · Database snapshots & citation guide
We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.